root@bibek:~$ Engaging research + defense protocols...
2
Research
Internship
5+
Projects
Completed
root@bibek:~$ Engaging research + defense protocols...
Research
Internship
Projects
Completed
I’m Bibek Bhandari, a Computer Science & Engineering (Cybersecurity) undergraduate at SRM University AP.
I focus on defensive security, vulnerability patching, and system protection, combined with a deep interest in LLM/AI system security — preventing prompt injection, data leakage, adversarial manipulation, and unauthorized access.
Recently, I’ve expanded into reverse engineering (Ghidra, x64dbg), malware analysis, threat modeling, cloud/container security (Docker, Kubernetes, AWS IAM/GuardDuty), and secure multi-agent communication systems involving mutual TLS and integrity-locked audit trails.
I also enjoy penetration testing, VAPT, SIEM workflows, and understanding how attackers think — not to imitate them, but to design systems they cannot break.
Beyond screens and terminals, I carry the same curiosity and discipline into life.
Academic and applied contributions
Research Internship on identifying and redacting Personally Identifiable Information (PII) from chatbot conversations.
Used DeBERTa on ECHR dataset, achieving 92% accuracy in secure dialogue systems and compliance-driven NLP.
Year: 2025
Working on a distributed multi-agent framework designed for secure, cross-organizational information exchange.
Built integrity-protected communication using SHA-256 hash-chained audit logs, mutual TLS (X.509), and
lightweight policy rules to prevent unauthorized or sensitive data transmission.
Focused on trust boundaries, protocol hardening, and designing security layers for federated agent ecosystems.
Year: 2025–Present
Applied security and innovation
A lightweight security tool for CI/CD pipelines that detects malicious changes between v1 → v2 software updates.
Automates static diff analysis, flags suspicious modifications, and generates forensic HTML reports for analysts.
Designed to enforce secure update validation before deployment, ensuring only trusted code reaches production.
Simulated end-to-end malware attack via a fake React app, delivering multiple payloads.
Developed Python payloads (clipboard hijack, registry persistence, stealth evasion, C2 patterns).
Used Wireshark, Autoruns, and Process Explorer for incident response and forensic analysis.
Technical expertise and tools
C • Python • Shell Scripting • Assembly • pwntools • Ghidra • x64dbg
Wireshark • Burp Suite • OWASP ZAP • Metasploit • Nessus • Snort • Trivy • Falco • PEstudio • DIE • YARA
Docker • Kubernetes • AWS (IAM, GuardDuty) • Terraform + Checkov
MITRE ATT&CK • MITRE ATLAS • NIST AI RMF • OWASP LLM Top 10 • NIST SSDF • CISA KEV
AI/LLM Security • Adversarial ML • Threat Modeling • Malware Analysis • Cloud/Container Security
Proof of learning and skills
Infosys Springboard • Feb 2025
Coursera • Dec 2024
Coursera • Nov 2024
Recognitions and milestones
SRM University AP • 2022–Present
Full tuition waiver for academic excellence.
Stantec Inc, Canada • 2024
One of 46 global recipients for academic excellence & leadership.
WHO Committee • 2020
Represented Nepal addressing global vaccination equity.